Schlagwort: IT Security

[:en]The use of virtual currencies is steadily growing. These currencies are independent of central banks, commercial banks, or nations and are traded directly between users, thereby evading traditional methods of government intervention. This makes virtual currencies attractive to actors in organized financial crime. However, until…

Today we released our intuitive data encryption software TAVUU. TAVUU provides secure data sharing/storage in the cloud and enables you to connect to arbitrary cloud providers without having to rely on their security standards. Download the free backup version of TAVUU at tavuu.com.

The essential characteristics of cloud computing such as elasticity or broad network access provide many economic benefits for their users, but with these benefits also many security and privacy risks come along. These risks can be generally classied into legal and technical risks. The upcoming…

aisel.aisnet.org/amcis2012/proceedings/ISHealthcare/17 Interconnected systems, such as electronic health records (EHR), considerably improved the handling and processing of health information while keeping the costs at a controlled level. Since the EHR virtually stores all data in digitized form, personal medical documents are easily and swiftly available when…

www.emeraldinsight.com/journals.htm The purpose of this paper is to propose a framework for security controls automation, in order to achieve greater efficiency and reduce the complexity of information security management. This research reviewed the controls recommended by well known standards such as ISO/IEC 27001 and NIST…

[:en] The average costs of data leakage are steadily on the rise. Especially in healthcare, the disclosure of sensitive information may have unfavorable consequences for the patient. As a consequence, several data security and access control mechanisms have been introduced, ranging from data encryption to…

ebooks.iospress.nl/publication/21844 While the digitization of medical data within electronic health records has been introduced in some areas, massive amounts of paper-based health records are still produced on a daily basis. This data has to be stored for decades due to legal reasons but is of…

[:en] Due to a rapid growth in the use of electronic data processing and networking, an information security management system with a holistic and widespread view becomes more and more important for any kind of organization. The fundamental challenge for such systems is the representation…

Recognition and Pseudonymization of Personal Data in Paper-Based Health Records: E-health requires the sharing of patient-related data when and where necessary. Electronic health records (EHR) allow the structured and expandable collection of medical data needed for clinical research studies and thereby not only enable the…